Click on the lock icon right next to website address in your browser.Click on the lock icon right next to website address in your browser.Open preferences by clicking safari icon in toolbar.

|

2

Notification permissions selection for the website are displayed in a dropdown, click on Site settingsNotification permissions selection for the website are displayed in a dropdown, click on Site settingsOpen 'Notifications' tab, you will see all the existing notifications.

Encryption refers to modification of the electronic data into a form that can be read by the person who knows translation of codes. Julius Caeser used this technique to shuffle letters, during the Roman Empire.

Purpose

Need for encryption

As the policy states, it aims at providing the privacy of information to the citizens and the protection of business related data.

Another reason behind this policy is to establish coherence, credibility and stability among various information networks and systems.

However, the fact that few other parts of the policy contradict its sole primary purpose, can't be overlooked.

Love Tech news?

Stay updated with the latest happenings.

Notify Me

22 Sep 2015

Government to soon regulate encryption standards

Soon after the National Encryption Policy is put into effect, removing whatsapp and google hangout messages will be counted as illegitimate.

The online businesses will be asked to keep the confidential information of users, like passwords by saving as plain text.

The policy has been framed by a body working under the Department of Electronics and Information Technology (DeitY).

Drawbacks

Encryption policy: A cause of concern

The range of services Indian citizens can access gets narrow as they can only use those services, whose vendors have registered in India.

Deleting messages from applications like Whatsapp becomes illegal.

Storage of all the data is practically not as easy as ABC.

One of the major reasons for resentment of this scheme is that it violates the privacy of netizens.

Regulation

Scheme for execution of policy

Soon, the formation of an administrative group to monitor the implementation of the policy, will be seen.

The agency will specialize in agreement of the service providers and the government to ensure proper registration as well as evaluation of the encrypted products.

The policy instructs that export of encrypted products would be carried only after the approval of the designated group.

Legal

Legal dimension in information technology

Indian law system readily allows such measures to be implemented.

Information technology act has been formulated, that paves way for establishment of such policies. For encryption, sec 84A and for decryption, sec 69 have been added.